Which of the following can be used for
reducing recovery time?
a) Automatic failover
b) By taking backup on a faster device
c) Taking multiple backups – one in same
location, another at different location
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned

Last Answer : Both RPO & RTO

Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned

Last Answer : Both RPO & RTO

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is an example of an unmanaged storage utility set up to do automated backups? a) XDrive b) OmniDrive c) FreeDrive d) All of the mentioned

Last Answer : All of the mentioned

Description : Under Hadoop High Availability, Fencing means a)Preventing a previously active namenode from start running again. b)Preventing the start of a failover in the event of network failure with the ... previously active namenode. d)Preventing a previously active namenode from writing to the edit log.

Last Answer : Preventing a previously active namenode from writing to the edit log.

Description : I've been using Backup on my Mac to back up my home folder. It has been putting these backups on my hard drive. Now I want to put all my backups on my Seagate external drive. Can I safely delete the backups that are on my hard drive since they're taking up 80 GB of space?

Last Answer : Plug the seagate in and it will ask you if you want to use the drive for time machine. Say yes, wait until it does a backup then delete the backups on your hard drive.

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following was one of the top 5 cloud applications in 2010? a) Cloud backup b) Web applications c) Business applications d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following backup technique is most space efficient? a) Full backup b) Incremental backup c) Differential backup d) All of the mentioned

Last Answer : Incremental backup

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following backup technique is most space efficient? a) Full backup b) Incremental backup c) Differential backup d) All of the mentioned

Last Answer : Incremental backup

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Which of the following qualifies as best DR (Disaster Recovery) site? a) DR site in the same campus b) DR site in the same city c) DR site in the same country d) DR site in a different country

Last Answer : DR site in a different country

Description : . Which of the following qualifies as best DR (Disaster Recovery) site? a) DR site in the same campus b) DR site in the same city c) DR site in the same countryd) DR site in a different country

Last Answer : DR site in a different country

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is the simplest unmanaged cloud storage device? a) file transfer utility b) antivirus utility c) online image utility d) none of the mentioned

Last Answer : none of the mentioned

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Which of the following is an online backup and storage system? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Simple Notification Service d) Amazon Simple Storage System

Last Answer : Amazon Simple Storage System

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Point out the correct statement. a) JumpIt is an open-source virtual appliance installation and management service b) Converting a virtual appliance from one platform to another is easy proposition c ... vendors support OVF, notably VMware, Microsoft, Oracle, and Citrix d) All of the mentioned

Last Answer : Nearly all major virtualization platform vendors support OVF, notably VMware, Microsoft, Oracle, and Citrix

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : hardware virtual machine

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : hardware virtual machine

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned